NEWS: 公告在東京證券交易所JASDAQ標準市場新上市

表紙
市場調查報告書

企業網絡安全實施報告:2021年

Enterprise Cybersecurity Adoption Report 2021

出版商 IoT Analytics GmbH 商品編碼 974429
出版日期 內容資訊 英文 120 Pages
商品交期: 最快1-2個工作天內
價格
企業網絡安全實施報告:2021年 Enterprise Cybersecurity Adoption Report 2021
出版日期: 2020年12月03日內容資訊: 英文 120 Pages
簡介

本報告探討了全球企業網絡安全市場,並提供了對當前網絡安全威脅,解決方案和供應商的詳細分析。

從兩個角度考慮29種不同的網絡安全解決方案/工具:部署和有效性

網絡安全當前的預算分配和未來三年的趨勢

識別99個供應商。頂級供應商是按全球利用率和滿意度來分類的,按地區和行業劃分

目錄

第1章概述和主要發現

  • 執行摘要
  • 全球網絡安全威脅與招聘:概述
  • 全球網絡安全威脅與招聘:按世界各地區

第2章主題介紹

  • 企業網絡安全的目標是什麼?
  • 網絡安全的重要性
  • OT安全與IT安全的融合
  • 2020年重大網絡攻擊的時間表並不詳盡

第3章調查方法和簡介

  • 調查方法
  • 調查問題的完整列表
  • 調查受訪者摘要(1/3):接受調查的行業
  • 調查受訪者摘要(2/3):被調查公司的樣本
  • 調查受訪者摘要(3/3):在組織中的作用
  • 本報告通過七個視角分析了網絡安全
  • 第4章:網絡安全威脅
  • 第5章:網絡安全功能及其有效性
  • 第6章:公司預算和決策流程
  • 第7章:操作和連接產品的保護
  • 第8章:供應商情況
  • 第9章:大流行和封鎖期間的網絡安全計劃
  • 第10章:最佳實踐和成功的風險降低

第4章網絡安全威脅

  • 第4章:網絡安全威脅-概述和重點
  • 平均風險評估
  • 深入探究(1/10):平均風險評估
  • 深入探究(2/10):惡意軟件
  • 深入探究(3/10):Lansome磨損
  • 深入探究(4/10):持續定向攻擊(APT)
  • 深入探究(5/10):內部威脅
  • 深入探究(6/10):拒絕服務(DDoS)
  • 深入探究(7/10):應用程序劫持
  • 深入探究(8/10):中級(MITM)攻擊
  • 深入探究(9/10):蠻力攻擊(圓形攻擊)
  • 深入探究(10/10):身體鍛煉
  • 成功降低了網絡安全風險

第5章網絡安全工具

  • 第5章:網絡安全工具-概述和關鍵點
  • 完全部署的網絡安全解決方案的平均數量
  • 網絡安全解決方案分為三大類
  • 最部署,最有效的網絡安全技術概述
  • 端點安全性:安全工具的有效性
  • 網絡安全:部署單個工具
  • 網絡安全:安全工具的有效性
  • 安全生命週期管理:各個工具的部署
  • 安全生命週期管理:安全工具的有效性
  • Deep Dive-AI和基於雲的網絡安全工具(1/2)
  • Deep Dive-AI和基於雲的網絡安全工具(2/2)
  • 網絡安全解決方案的有效性和部署
  • 下一個領域:公司目前正在考慮的工具
  • 最常用的網絡安全服務
  • 採購安全服務

第6章網絡安全預算和決策流程

  • 第6章:網絡安全預算和決策-概述和關鍵點
  • 現在和從現在開始的三年後的網絡安全預算分配
  • 網絡安全產品和服務的決策權
  • 選擇過程中來源的重要性
  • 按地區選擇資源的重要性
  • 根據公司規模選擇資源的重要性
  • 供應商選擇標準的重要性
  • 各地區選擇標準的總體重要性
  • 選擇標準的一般重要性-按公司規模
  • 考慮在何處託管安全數據/軟件
  • 考慮在何處託管安全數據/軟件:按公司總部劃分

第7章特定於安全性的深潛

  • 第7章:特定於安全性的詳細信息-概述和關鍵點
  • 深入探究A操作:安全方法
  • 深入研究A-操作:安全操作工作隊(1/2)
  • 深入研究A –操作:安全操作工作隊(2/2)
  • 深入探究B-Smart產品:供應商選擇標準
  • 深入探究B-Smart產品:供應商選擇標準(按地區)
  • 深入探究B-Smart產品:供應商選擇標準-按公司規模
  • 深入探究B-Smart產品:終身技術堆棧支出
  • 深入探究B-Smart產品:網絡安全供應商推薦的類型
  • 深入探究B-Smart產品:網絡安全供應商推薦類型-地區
  • 深入探究B-Smart產品:網絡安全廠商的推薦類型-根據公司規模

第8章供應商狀況

  • 第8章:供應商狀況-概述和重點
  • 公司使用的網絡安全廠商的平均數量
  • 區域和行業使用率最高的十大網絡安全廠商
  • 區域和行業使用率最高的前20名網絡安全供應商
  • 受訪者提到的其他供應商

第9章Covid-19的影響

  • 第9章:COVID-19和封鎖概述的影響和關鍵點
  • 大流行和封鎖期間的網絡安全
  • 受安全攻擊次數增加的受訪者比例
  • 看到新型安全攻擊的受訪者百分比
  • 關注更強網絡衛生的受訪者百分比
  • 審查風險管理實踐的受訪者百分比
  • 計劃在COVID-19鎖定後增加安全預算
  • 對安全相關法規的期望
  • COVID-19期間 "影子IoT" 的挑戰
  • COVID-19如何影響您的安全策略

第10章IoT安全的成功因素

  • 第10章:IoT安全的成功因素-概述和關鍵點
  • 成功降低了網絡安全風險
  • 確定IoT安全性的九個關鍵成功因素
  • 主要成功因素(1/6)
  • 主要成功因素(2/6)
  • 主要成功因素(3/6)
  • 主要成功因素(4/6)
  • 主要成功因素(5/6)
  • 主要成功因素(6/6)

第11章附錄

目錄

120-page adoption report with detailed insights on current cybersecurity threats, solutions, and vendors including:

  • 9 most common cybersecurity threats and their assessment by end-users
  • 29 cybersecurity solutions focusing on end-point security, network security and secure lifecycle management
  • Insights on 99 vendors including satisfaction by region and industry
  • Enterprise budget allocation & decision process (decision makers, information sources, selection criteria)
  • Cybersecurity deep-dives: A. Security of the operations (OT) and B. Security of smart connected products
  • Insights on cybersecurity priorities as a result of COVID-19
  • Key success factors for making IoT security technologies work
  • And more...

The“ Enterprise Cybersecurity Adoption Report 2021” is part of IoT Analytics' ongoing coverage of IoT software & platforms (IoT Platforms/Software Research Workstream) . The information presented in this report is based on an extensive survey, with leading cybersecurity decision-makers among manufacturing and other industries. The purpose is to inform other market participants about the current state of cybersecurity threats and adoption of cybersecurity tools across companies. Survey participants were randomly selected, and their knowledge independently verified. In order to ensure complete objectivity, IoT Analytics did not alter or supplement any survey results and also did NOT accept any participation from participants that were suggested from third-parties (e.g., customers of specific vendors).

FIND OUT

  • What cybersecurity threats are seen as most risky?
  • What cybersecurity solutions are companies adopting and to which degree?
  • Which cybersecurity tools are seen as most effective?
  • Which are some of the common cybersecurity vendors and how well-perceived are they?
  • Who is deciding and influencing the purchase of cybersecurity products and services?
  • How is the spending distributed across the tech stack?
  • Which regions are preferred to host servers with cybersecurity related data or software?
  • How do companies secure their operations ?
  • How do companies secure their connected product ?
  • How has COVID-19 impacted the cybersecurity situation?
  • What are best-practices of mitigating IoT security risks?

AT A GLANCE:

The “Enterprise Cybersecurity Adoption Report 2021” analyses the adoption of cybersecurity solutions, how vendors are rated and what makes cybersecurity work. The report is based on a survey of 60 cybersecurity professionals (CISOs, CIOs, or similar) and highlights the end-user perspective.

The report analyzes the cybersecurity situation across 7 chapters:

  • 1. Cybersecurity threats
  • 2. Cybersecurity tools and their effectiveness
  • 3. Cybersecurity budgets & decision processes
  • 4. Specific deep-dives
  • 5. Vendor landscape
  • 6. Impact of COVID-19 and lockdowns
  • 7. Success factors for IoT security

The report looks at 29 different cybersecurity solutions/tools from two perspectives: deployment and effectiveness

The cybersecurity budget allocation is shown today as well as the trend for the next three years

The report identifies 99 vendors. The top vendors are segmented into overall usage and satisfaction rates by world region and industry.

Table of Contents

1. Overview & main findings

  • Executive Summary (1/3)
  • Executive Summary (2/3)
  • Executive Summary (3/3)
  • Global cybersecurity threats & adoption 2020 - Overview
  • Global cybersecurity threats & adoption 2020 - by world region

2. Topic introduction

  • What is covered by enterprise cybersecurity ?
  • Importance of cybersecurity
  • Convergence of OT security and IT security
  • Non-exhaustive timeline of notable cyberattacks in 2020

3. Methodology & introduction

  • Research methodology
  • Full list of survey questions
  • Overview of survey respondents (1/3): Industries surveyed
  • Overview of survey respondents (2/3): Sample of surveyed companies
  • Overview of survey respondents (3/3): Role in the organization
  • This report analyses cybersecurity through 7 lenses
  • Chapter 4: Cybersecurity threats
  • Chapter 5: Cybersecurity capabilities and their effectiveness
  • Chapter 6: Enterprise budgets & decision processes
  • Chapter 7: Securing the operations and the connected product
  • Chapter 8: Vendor landscape
  • Chapter 9: Cybersecurity initiatives during pandemic and lockdowns
  • Chapter 10: Best-practices and successful risk mitigation

4. Cybersecurity threats

  • Chapter 4: Cybersecurity threats - Overview & key takeaways
  • Average assessment of risk
  • Deep-dive (1/10): Average assessment of risk
  • Deep-dive (2/10): Malware
  • Deep-dive (3/10): Ransomware
  • Deep-dive (4/10): Advanced persistent threats (APTs)
  • Deep-dive (5/10): Insider threat
  • Deep-dive (6/10): Denial-of-service (DDoS)
  • Deep-dive (7/10): Application hijacking
  • Deep-dive (8/10): Man-in-the-middle (MITM) attack
  • Deep-dive (9/10): Brute force attack
  • Deep-dive (10/10): Physical tampering
  • Success at mitigating cybersecurity risks

5. Cybersecurity tools

  • Chapter 5: Cybersecurity tools - Overview & key takeaways
  • Average number of fully deployed cybersecurity solutions
  • Cybersecurity solutions are split into three main categories
  • Overview of most deployed and most effective cybersecurity technologies
  • End-point security: Effectiveness of security tools
  • Network security: Deployment of individual tools
  • Network security: Effectiveness of security tools
  • Secure lifecycle management: Deployment of individual tools
  • Secure lifecycle management: Effectiveness of security tools
  • Deep-dive AI & cloud-based cybersecurity tools (1/2)
  • Deep-dive AI & cloud-based cybersecurity tools (2/2)
  • Effectiveness and deployment of cybersecurity solutions
  • The next frontier - the tools that companies are currently considering
  • Most used cybersecurity services
  • Procurement of security services

6. Cybersecurity budgets & decision processes

  • Chapter 6: Cybersecurity budgets & decision - Overview & key takeaways
  • Allocation of cybersecurity budget now and in 3 years
  • Decision power for cybersecurity products and services
  • Importance of information sources for selection process
  • Importance of information sources for selection process - by region
  • Importance of information sources for selection process - by company size
  • Importance of vendor selection criteria
  • General importance of selection criteria - by region
  • General importance of selection criteria - by company size
  • Consideration of location for hosting security data/software
  • Consideration of location for hosting security data/software - by comp. HQ

7. Security specific deep-dives

  • Chapter 7: Security specific deep-dives - Overview & key takeaways
  • Deep-dive A Operations: Security approaches
  • Deep-dive A Operations: Security operations task force (1/2)
  • Deep-dive A Operations: Security operations task force (2/2)
  • Deep-dive B Smart Products: Vendor selection criteria
  • Deep-dive B Smart Products: Vendor selection criteria - by region
  • Deep-dive B Smart Products: Vendor selection criteria - by size
  • Deep-dive B Smart Products: Lifetime tech stack spending
  • Deep-dive B Smart Products: Preferred type of cybersecurity vendor
  • Deep-dive B Smart Products: Preferred type of cybersecurity vendor - region
  • Deep-dive B Smart Products: Preferred type of cybersecurity vendor - size

8. Vendor Landscape

  • Chapter 8: Vendor landscape - Overview & key takeaways
  • Average number of cybersecurity vendors used by company
  • Most used cybersecurity vendors by region and industry - Top 10 by usage
  • Most used cybersecurity vendors by region and industry - Top 20 by usage
  • Additional vendors mentioned by respondents

9. Impact of Covid-19

  • Chapter 9: Impact of COVID-19 and lockdowns - Overview & key takeaways
  • Cybersecurity during pandemic and lockdown
  • Share of respondents that have seen an increased amount of security attacks
  • Share of respondents that have seen new types of security attacks
  • Share of respondents that focus on stronger cyber hygiene
  • Share of respondents that review risk management practices
  • Planning to increase security budget after Covid-19 lockdown
  • Expectation of security-related regulations
  • Challenges with "Shadow IoT" during COVID-19
  • How has Covid-19 impacted the security strategy

10. Success factors for IoT security

  • Chapter 10: Success factors for IoT security- Overview & key takeaways
  • Success at mitigating cybersecurity risks
  • 9 key success factors for IoT security identified
  • Key Success factors (1/6)
  • Key Success factors (2/6)
  • Key Success factors (3/6)
  • Key Success factors (4/6)
  • Key Success factors (5/6)
  • Key Success factors (6/6)

11. Appendix